Detection and prevention of DNS spoofing attacks

  title={Detection and prevention of DNS spoofing attacks},
  author={A. A. Maksutov and I. Cherepanov and Maksim S. Alekseev},
  journal={2017 Siberian Symposium on Data Science and Engineering (SSDSE)},
One of the modern MitM-attacks on HTTPS is attacks using SSLstrip and SSLstrip+ utilities, the latter of which uses a DNS-spoofing type attack. Currently, there are several ways to protect against replacing DNS responses, but there is no available and simple tool for detecting a DNS-spoofing attack. The utility designed for this is called DNSwitch and was described in this article. 
Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard
  • Q. Hu, M. Asghar, N. Brownlee
  • Computer Science
  • 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
  • 2018
This paper evaluates new IPv6 reconnaissance techniques in real IPv6 networks and exposes how to leverage the Domain Name System for IPv6 network reconnaissance and proposes a DNS Guard (DNSG) to efficiently detect DNS reconnaissance attacks in IPv 6 networks. Expand
Detecting Malicious DNS over HTTPS Traffic Using Machine Learning
  • S. Singh, Pradeep Kumar Roy
  • 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT)
  • 2020
Network with the internet has grown-up very faster compared with any other technology around the world. From the beginning of the Internet, the Domain name system (DNS) is an integral and importantExpand
SFDS: A Self-Feedback Detection System for DNS Hijacking Based on Multi-Protocol Cross Validation
It is shown that in real circumstance for two weeks, SFDS can find almost 1300 correct (Domain, IP) tuples for one domain on average in one day, and SFDS is effective with accuracy approximately 100% by the authors' experiments. Expand
Secure Socket Layer Stripping Attack Using Address Resolution Protocol Spoofing
This paper describes the step by step procedure to make SSL strip attack any secured https website, using ARP spoofing to strip HTTPS to HTTP. Expand
Technique for IoT Cyberattacks Detection Based on DNS Traffic Analysis
A new technique for cyberattacks detection based on DNS traffic analysis is presented, which enables the proactive malicious requests detecting in corporate area networks based on Domain Name System (DNS) protocol, and is aimed to identify and block the malicious domains and DND data deletion requested by the attackers. Expand
DCG: A Client-side Protection Method for DNS Cache
This paper proposes a client-side protection method fordomain name system cache that monitors the local cache of domain name system in real time and asynchronously verifies the authenticity of each name resolution result through a trusted third party. Expand
Co_Hijacking Monitor: Collaborative Detecting and Locating Mechanism for HTTP Spectral Hijacking
  • Pan Wang, X. Chen
  • Computer Science
  • 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
  • 2017
Experimental result shows that, Co HijackingMonitor can solve the hijacking problem effectively and analyze the principle of HTTP spectral Hijacked and present a mechanism of collaboratively detecting and locating called Co HIJackingMonitor. Expand
DNS attack mitigation Using OpenStack Isolation
This research aims to propose a model for the development of a private cloud infrastructure to host DNS, which will be created using the OpenStack software platform where each server will be hosted separately in a different virtual machine. Expand


Internet Attack Methods and Internet Security Technology
  • O. Adeyinka
  • Computer Science
  • 2008 Second Asia International Conference on Modelling & Simulation (AMS)
  • 2008
This paper investigates common Internet attack methods and different Internet security technologies as well as different solutions to be effective against different types of attacks. Expand
Differentiating Data Security and Network Security
  • S. Kartalopoulos
  • Computer Science
  • 2008 IEEE International Conference on Communications
  • 2008
A method for detecting the channel signature and how it is used to discriminate between degradation/failure and attacks and thus enhance network security is described, as well as a method for attack detection and countermeasure strategies. Expand
Internet security architecture
  • R. Molva
  • Computer Science
  • Comput. Networks
  • 1999
The IPsec architecture including security protocols in the Internet Layer and the related key management proposals are introduced, and the transport layer security protocol and security issues in the network control and management are presented. Expand
Network Security Basics
  • G. Marin
  • Computer Science
  • IEEE Secur. Priv.
  • 2005
This article focuses on the practical networking aspects of security, which include computer intrusion detection, traffic analysis, and network monitoring, and principally entail a networking perspective. Expand
IPv6: The Next Internet Protocol
The motivations for IPV6, its history, its design criteria, and some of its new features are discussed, and a look at future deployment and applications is presented. Expand
Network Security: It's Time to Take It Seriously (Guest Editors' Introduction)
A frequency synthesizer of the type which selects pulses from a clock pulse generator (21) to provide a lower output frequency Fo, the synthesizer including an accumulator (22) of the type which, forExpand
The Art in Computer Programming
Here the authors haven’t even started the project yet, and already they’re forced to answer many questions: what will this thing be named, what directory will it be in, what type of module is it, how should it be compiled, and so on. Expand
Cloud Computing Architectures for Mobile Robotics
in last decade, classic IT-infrastructur es in modern enterprises have been changed sufficiently by cloud computing. However, cloud approach can be used effectively in other applications. In thisExpand
Cloud computing architectures for mobile robotics
This paper explores applicability of cloud paradigm in mobile robotics by using some classic cloud architectures with some special “robotic” types of clouds to leverage abilities of a single robotics platform in mobile robotic system as services to robotic system's users or other mobile robotic platforms. Expand